Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 23:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://playvalorant.com/en-us/
Resource
win10v2004-20231215-en
General
-
Target
https://playvalorant.com/en-us/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528584521401499" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 60 2876 chrome.exe 86 PID 2876 wrote to memory of 60 2876 chrome.exe 86 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 4484 2876 chrome.exe 92 PID 2876 wrote to memory of 2400 2876 chrome.exe 91 PID 2876 wrote to memory of 2400 2876 chrome.exe 91 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90 PID 2876 wrote to memory of 3156 2876 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://playvalorant.com/en-us/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8acf79758,0x7ff8acf79768,0x7ff8acf797782⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:22⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4896 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4672 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5012 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5600 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:12⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 --field-trial-handle=1872,i,8361337735677428189,12206903821961882518,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3764
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x43c1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5c7720da200621d11f7d230731b3c9214
SHA19243f0146e7cbbaed45f4af8ea2101e41c31df13
SHA256f36e829bca15c654e0f8d2a6daa56aa3545dd22f06ef305f68b5dcafcd3f0829
SHA512a96b9761dcd20e2de1df4446a1996701729b9a94a311090f8eb3f27dfbc1b7baed62291e6d82956e6cb89223f285a09d791230cd9faff32e483be51ff0370960
-
Filesize
2KB
MD5b9c029f4712b01477f2b0173e971e816
SHA10dba9750bb4b1a5c5822feb6464be3a42413e189
SHA25638bae77f913c66f793a7d100bde3bb65820ddbbab0f386929db55df24fc8668f
SHA5127ef9beddf400c7a3f759edadd26fdb0737b23940e00f2539322eb249bee54334fee736769e1a1fd63540c38d52d7bd4bdc44f024ff628418948bd66d26a50c13
-
Filesize
1KB
MD56d1f6b94f6dac395362d14f30061c138
SHA1ae1229394e23bcda5882bdc85d903258ffbb7635
SHA256c2c0d26f66a87534853d87c250adbeb260fecbf6bc04caf3297031e1307ca820
SHA512b08ea81fcc12eb860ad469c988f2ff7c2e970f1ab55e75dfa41b979360147e9dbba78168b80f9256438b4cd45fdb27c6f269983b1f2dd791e9040680dc674158
-
Filesize
1KB
MD574a23ad70a3502966cc904d4a9ee5042
SHA12273a97cf0ce18c7c1567cf0e3425170531ac1f6
SHA256a165a0eef7f58bdc065b4983b5983593daa807dfb8e9f9298ad2e9b70f1e916d
SHA512c6b585bb5a84330b0ceea8e4da868e8a797855722e26333e15cefb66b239a9d693fb9144da0b2e5c27da825640a796e1b0c3407861d743d167f49fd59ead7105
-
Filesize
6KB
MD54666944a60aa2e8ffa71c7221c5bea41
SHA17e9a6f2d21decce0758fb68aa01b667add46a10c
SHA25690c28bcb2b75d91bc5ddee8390d163bcc4860fb0187a1ab4c1d9e0f50adac3e3
SHA5125bb09130df71dbe0aefc5bc5c83992250b6e22a60c1fb45e9e425b4d05788093342c7d456daabba669e753f74c3f51b482d27c52e52a50690a02fa80721e8cf7
-
Filesize
6KB
MD5516a80a5b2ef32fd5ade420245a93f9a
SHA197d53f6d63686cb69a46616b0d523da91fb5a8e7
SHA2561c25a906973c5012d8aa53c4269b6da943cc9f1aebd5d4c988f3f9f4fbffc7f6
SHA5121073988abe4427a6f57df53470c72617801d50517e40256fe12713c34d3d24548334a1bc93c22e2217cf03b4279564e609a6194adb15558615683965e5b7259b
-
Filesize
6KB
MD55548833b131de7afdb8fefbfdafb139e
SHA17c212d8080bc788ce57e4d87c37bea04cd681226
SHA2568bb62744a63ea9844fbd4e6d7789942ae924943c1a4a59a6907c7c3b39d45d11
SHA512ff1e7be0b3ac31735051231ea66f8e373e775462f9bf06a889fac3d5d2c28726d970f557c64970301e0a885cf0e43e9cd1da7c86d3d7937295f50e3ecc9bc7ce
-
Filesize
114KB
MD5836e1d2d7e53b72812c33752ae99ee04
SHA161aa548afe0b172a91576d4e78859d2bce0f04f9
SHA25677fcf4dd3e017b2d4fc65ea3f352b5fae2fdd66780fec8203ff75a4b783f315a
SHA512bfdc5a1d00c362d6a58af7224bfc68a82e9e3d97b2aab605f98c4bafe2edda610a653253818577f77754ab7396d60cb82512ec25b53dcbeefb331ca4d52f8b56
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd